dc.contributor.author | Yang, EH | |
dc.contributor.author | Wu, XW | |
dc.date.accessioned | 2018-03-22T02:03:22Z | |
dc.date.available | 2018-03-22T02:03:22Z | |
dc.date.issued | 2017 | |
dc.identifier.isbn | 9781509040964 | |
dc.identifier.issn | 2157-8095 | |
dc.identifier.doi | 10.1109/ISIT.2017.8006785 | |
dc.identifier.uri | http://hdl.handle.net/10072/372039 | |
dc.description.abstract | In this paper, we address the problems of key generation and management for enabling one-key-for-one-file secure encryption, where every file is encrypted by using an independent random key, which is highly desired in long-term protection of data stored on public clouds and other applications. A new concept dubbed information-theoretical ϵ-security is introduced to measure the security of a keystore (i.e., a set of random keys, ki, 1 ≤ i ≤ Λ, each consisting of l bits) which are generated from a random string of L bits, called the keystore seed. An efficient keystore generation scheme is presented, and the resulting keystore Ψ = {ki :1 ≤ i ≤ Λ} is shown to be information-theoretically e-secure with small e. Specifically, they satisfy the following properties: (1) Λ ≫ L is sufficiently large to realize one-key-for-one-file encryption for applications with a large number of files; (2) for any key index i, the key ki is uniformly distributed over the key space {0,1}1 and hence statistically independent of i if i is chosen randomly; (3) for any two independent i, j, 1 ≤ i, j ≤ Λ, the probability that ki = kj is less than (1 - ϵ) × 2-l + ϵ and (4) for any two independent key indices i and j, knowing i, j, and ki does not reduce the amount of uncertainty about kj significantly, i.e., the conditional Shannon entropy H (kj |i, j, ki)is at least as large as (1 - ϵ)H(kj | j). These security properties along with easy generation of each key ki from the keystore seed and the key index i remove most challenges in distributing and managing a large number of random keys. | |
dc.description.peerreviewed | Yes | |
dc.language | English | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.publisher.place | United States | |
dc.relation.ispartofconferencename | ISIT 2017 | |
dc.relation.ispartofconferencetitle | IEEE International Symposium on Information Theory - Proceedings | |
dc.relation.ispartofdatefrom | 2017-06-25 | |
dc.relation.ispartofdateto | 2017-06-30 | |
dc.relation.ispartoflocation | Aachen, Germany | |
dc.relation.ispartofpagefrom | 1529 | |
dc.relation.ispartofpageto | 1533 | |
dc.subject.fieldofresearch | Computer System Security | |
dc.subject.fieldofresearchcode | 080303 | |
dc.title | Information-theoretically secure key generation and management | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.hasfulltext | No Full Text | |
gro.griffith.author | Wu, Xin-Wen | |